Honeypots

157 tools and resources

Tags in this Category

FEATURED

Feature Your Cybersecurity Product

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Boost Your Visibility

NEW

A hybrid honeypot framework that combines low and high interaction honeypots for network security

A low-interaction SSH honeypot tool for recording authentication attempts.

A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server

Script for turning a Raspberry Pi into a Honey Pot Pi with various monitoring and logging capabilities.

A script for setting up a dionaea and kippo honeypot using Docker images.

A basic Flask-based Outlook Web App (OWA) honeypot for cybersecurity experimentation.

High interaction honeypot solution for Linux systems with data control and integrity features.

Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.

HellPot is an endless honeypot that sends unruly HTTP bots to hell with grave consequences.

A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.

A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.

bap Logo
0.0

bap is a webservice honeypot that logs HTTP basic authentication credentials.

Ansible role for deploying and managing Bifrozt honeypots

OpenCanary is a multi-protocol network honeypot with low resource requirements and alerting capabilities.

A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.

A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.

A Perl honeypot program for monitoring hostile traffic and wasting hackers' time.

A nodejs web application honeypot designed for small environments.

Honeypot tool with bug-catching capabilities and support for multiple protocols.

GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

Honeypot for analyzing data with customizable services and logging capabilities.

45
6
78